How Hackers Hack Companies With Microsoft Office

preview_player
Показать описание
Demonstrating one of the most common methods hackers use to get into company networks and what to look out for. Full version coming soon.
Рекомендации по теме
Комментарии
Автор

This should be a mandatory new employee video for all companies

RobertWallhead
Автор

ive been looking for a video showcasing this for so long! from a cs student always hungry to learn thank you so much Marcus!

henchnerd
Автор

I watched disrupted video on you and I’m so glad I found your channel

jjjoh_
Автор

This is one of APT28's favorite methods of delivery so happy to see an example finaly! (second comment for the algorithim)

henchnerd
Автор

Yes! I love these videos so much!! Just one question, I've always been interested in reversing stuff, and I just want to know when is the next reverse engineering with IDA/Ghidra tutorial gonna be? Anyways thanks

georgesanderson
Автор

Great video, new to InfoSec but I love videos that show how easy it is to get user privilege on a box, really scares everyone else lol

eros
Автор

For companies, this option would only have to be able to run VBA with their own company signature, so outside of Office or Excel files can only be run with a valid signature from their company. That's how it is with us, if I would write a VBA, the admin has to sign it to be able to run the script

hitorinohitorino
Автор

any practical advice for companies who genuinely use macros as part of their Office docs and apps - or are we just saying don't click "enable content"?

tehprlol
Автор

Why did you do it in windows 8, is it possible in win 10 updated?

pabloturnesg
Автор

Great video for end users. Many thanks. Its scary to think how easy it is to get remote access. May I use this if I use your reference?

ITLifeLineLtd
Автор

I don't understand how the antivirus doesn't pick up on the malware.

didyouknowamazingfacts
Автор

Can u make video on how to setup tor to completely anonymous on internet

mayurahir
Автор

can i ask a permission to make this video a mandatory and security awarness video for my company? i will include the original owner and crator of course, i really love all your videos it's so helping for me!

dalvizar
Автор

Get reverse shell possible.. but how did you open desktop on kali

spacifiasome
Автор

I love companies who give you gaming laptops as work laptop :)
seriously though, nice presentation

maestro
Автор

you should show what's in the VBA code. Is it not detected by AV?

novianindy
Автор

Any step by step how to set up this both on Win PC (The script) and on K.ali Linux PC?
Thanks

Afrocyber
Автор

When are you coming to teach us the full skills as a tutorials boss

alexsec
Автор

Didnt know you made this video i watched it like 50 times

boogaplays
Автор

This is a really usefull information sir, thanks for the informations.

I'm a IT Security Officer in my company, and already experienced one case regarding to this Technique, so what mus we do if we need to edit the Documents because it's important?

Because the antivirus in my companies not detect the suspicious background activity whenever user click "Enable Protected View".

Do i must check it with reverse engineering or just checking in virustotal to avoid Security Issues?

Thanks

dalvizarkafilhamristijana